security

US Senators Aim to Block Foreign Tech that Poses Threat – GovInfoSecurity.com


Critical Infrastructure Security
,
Legislation & Litigation
,
Standards, Regulations & Compliance

Senators Target TikTok and Other Chinese Companies in White House Backed Bill

US Senators Aim to Block Foreign Tech that Poses Threat

A dozen U.S. senators on Tuesday introduced bipartisan legislation backed by the White House charging the federal government with initiating a process to systematically block foreign technology from reaching the domestic market when the tech poses a national security threat.

See Also: OnDemand | Navigating the Difficulties of Patching OT

Backers say the bill, the Restricting the Emergence of Security Threats that Risk Information Communications Technology Act, could result in restrictions for the social media platform TikTok, which is owned by Chinese company ByteDance.

The short form video app has operated under a cloud of Washington, D.C.-driven opposition dating to fears by the Trump administration that TikTok shares data with the Chinese government and could be used in Beijing influence operations. TikTok has sought to tamp down accusations of close connections with the People’s Republic of China, migrating user data to centers in the United States. It has driven back on First Amendment grounds in multiple federal courthouses executive branch attempts to ban it. Analysis in 2021 by The Citizen Lab concluded that TikTok collects similar types of data as other social media platforms – while also noting that “the general privacy standards for social platforms is not a high bar.”

Bill sponsor Senator Mark Warner said the bill is larger than TikTok. “We need a comprehensive, risk-based approach that proactively tackles sources of potentially dangerous technology before they gain a foothold in America, so we aren’t playing Whac-A-Mole and scrambling to catch up once they’re already ubiquitous,” the Virginia Democrat said.

Readers Also Like:  Security company hopes artificial intelligence can help police - WTHR

The bill’s Republican sponsor is Senator John Thune of South Dakota; 10 evenly split Democrats and Republicans are co-sponsors.

The Biden administration was quick to praise the bill, issuing a statement from National Security Advisor Jake Sullivan calling on Congress to quickly “send it to the president’s desk.”

The legislation is the latest example of widening suspicion by Western governments of Chinese technology that’s fueled by concerns over the extent of Chinese geopolitical ambitions. Western governments have also objected to Beijing’s systemic human rights abuses of its Uyghur population. The United States has effectively blacklisted Chinese telecom manufacturers Huawei and ZTE, video surveillance equipment makers Hikvision and Dahua as well as Hytera, which makes two-way radio systems.

The German government this week it may follow suit at least partially on Huawei and ZTE gear (see: Germany’s 5G Safety Review Could Ban Huawei and ZTE Gear).

The U.S. is trying to ensure the bans go both ways by imposing export controls on advanced semiconductor technologies to prevent them from reaching China.

The RESTRICT Act would require the Department of Commerce to begin reviewing purchases of good and services from Chinese-based companies for risks to national security. The department could expand the list of “foreign adversaries” covered by the bill to cover additional countries.

The department would be empowered to prohibit such transaction or impose measures to mitigate the risk. Technology used in critical infrastructure would receive priority consideration, as would any product that processes the data of more than 1 million American users.

Readers Also Like:  The 10 Best Cloud Security Certifications for IT Pros in 2024 - TechTarget

Violations of Commerce determinations would be enforceable in criminal and civil court. Under the bill, the department wouldn’t have much time to stand up a review process – not more than 180 days after the legislation would become law.





READ SOURCE

This website uses cookies. By continuing to use this site, you accept our use of cookies.